메뉴 건너뛰기




Volumn , Issue , 2016, Pages 196-199

Image tampering detection based on local texture descriptor and extreme learning machine

Author keywords

Extreme learning machine; Image forgery detection; LBP; Splicing and copy move forgery

Indexed keywords

IMAGE RETRIEVAL; KNOWLEDGE ACQUISITION; LEARNING SYSTEMS;

EID: 85011024311     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/UKSim.2016.39     Document Type: Conference Paper
Times cited : (18)

References (20)
  • 2
    • 84934324709 scopus 로고    scopus 로고
    • Image forgery detection using adaptive oversegmentation and feature point matching
    • Aug.
    • C. M. Pun, X. C. Yuan and X. L. Bi, "Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015.
    • (2015) IEEE Transactions on Information Forensics and Security , vol.10 , Issue.8 , pp. 1705-1716
    • Pun, C.M.1    Yuan, X.C.2    Bi, X.L.3
  • 3
    • 84863325954 scopus 로고    scopus 로고
    • Passive copy move image forgery detection using undecimated dyadic wavelet transform
    • G. Muhammad, M. Hussain, and G. Bebis, "Passive copy move image forgery detection using undecimated dyadic wavelet transform," Digital Investigation, Elsevier, vol.9, issue 1, pp. 49-57, 2012.
    • (2012) Digital Investigation, Elsevier , vol.9 , Issue.1 , pp. 49-57
    • Muhammad, G.1    Hussain, M.2    Bebis, G.3
  • 4
    • 84899992554 scopus 로고    scopus 로고
    • Image forgery detection using steerable pyramid transform and local binary pattern
    • May
    • G. Muhammad, M. H. Al-Hammadi, M. Hussain, and G. Bebis, "Image forgery detection using steerable pyramid transform and local binary pattern," Machine Vision and Applications, vol. 25, no. 4, pp. 985-995, May 2014.
    • (2014) Machine Vision and Applications , vol.25 , Issue.4 , pp. 985-995
    • Muhammad, G.1    Al-Hammadi, M.H.2    Hussain, M.3    Bebis, G.4
  • 6
    • 85011097247 scopus 로고    scopus 로고
    • LNCS 8034
    • G. Bebis et al. (Eds.): ISVC 2013, Part II, LNCS 8034, pp. 503-512, 2013.
    • (2013) ISVC 2013 , pp. 503-512
    • Bebis, G.1
  • 8
    • 84937804974 scopus 로고    scopus 로고
    • Copy-move image forgery detection based on Gabor magnitude
    • August
    • Jen-Chun Lee, "Copy-move image forgery detection based on Gabor magnitude," Journal of Visual Communication and Image Representation, vol. 31, pp. 320-334, August 2015.
    • (2015) Journal of Visual Communication and Image Representation , vol.31 , pp. 320-334
    • Lee, J.1
  • 10
    • 80052337449 scopus 로고    scopus 로고
    • A complete passive blind image copy-move forensics scheme based on compound statistics features
    • F. Peng, Y. Y. Nie and M. Long, "A complete passive blind image copy-move forensics scheme based on compound statistics features," Forensic Science International 212 (2011), pp. e21-e25.
    • (2011) Forensic Science International , vol.212 , pp. e21-e25
    • Peng, F.1    Nie, Y.Y.2    Long, M.3
  • 12
    • 84894902017 scopus 로고    scopus 로고
    • Accurate and robust localization of duplicated region in copy-move image forgery
    • M. Jabery, G. Bebis, M. Hussain, and G. Muhammad, "Accurate and robust localization of duplicated region in copy-move image forgery," Machine Vision and Applications, vpl. 25, pp. 451-475, 2014.
    • (2014) Machine Vision and Applications, Vpl. , vol.25 , pp. 451-475
    • Jabery, M.1    Bebis, G.2    Hussain, M.3    Muhammad, G.4
  • 13
    • 84878019726 scopus 로고    scopus 로고
    • Copy-move forgery detection and localization by means of robust clustering with J-Linkage
    • I. Amerini, et al., "Copy-move forgery detection and localization by means of robust clustering with J-Linkage," Signal Processing: Image Communication, vol. 28, no. 6, pp. 659-669, 2013.
    • (2013) Signal Processing: Image Communication , vol.28 , Issue.6 , pp. 659-669
    • Amerini, I.1
  • 14
    • 84947744414 scopus 로고    scopus 로고
    • A bibliography of pixel-based blind image forgery detection techniques
    • November
    • M. A. Qureshi, and M. Deriche, "A bibliography of pixel-based blind image forgery detection techniques," Signal Processing: Image Communication, vol. 39, part A, pp. 46-74, November 2015.
    • (2015) Signal Processing: Image Communication , vol.39 , pp. 46-74
    • Qureshi, M.A.1    Deriche, M.2
  • 16
    • 33745903481 scopus 로고    scopus 로고
    • Extreme learning machine: Theory and applications
    • G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: theory and applications," Neurocomputing, vol.70, no. 1-3, pp.489- 501, 2006.
    • (2006) Neurocomputing , vol.70 , Issue.1-3 , pp. 489-501
    • Huang, G.-B.1    Zhu, Q.-Y.2    Siew, C.-K.3
  • 18
    • 84864758525 scopus 로고    scopus 로고
    • Evaluation: From precision, recall and f-factor to ROC, informedness, markedness & correlation
    • D. M. W. Powers, "Evaluation: from precision, recall and f-factor to ROC, informedness, markedness & correlation," J. Machine Learning Tech., vol. 2(1), pp. 37-63, 2011.
    • (2011) J. Machine Learning Tech. , vol.2 , Issue.1 , pp. 37-63
    • Powers, D.M.W.1
  • 20
    • 84924598252 scopus 로고    scopus 로고
    • Effective composite image detection method based on feature inconsistency of image components
    • April
    • W-C. Hu, J-S. Dai, and J-S. Jian, "Effective composite image detection method based on feature inconsistency of image components," Digital Signal Processing, vol. 39, pp. 50-62, April 2015.
    • (2015) Digital Signal Processing , vol.39 , pp. 50-62
    • Hu, W.-C.1    Dai, J.-S.2    Jian, J.-S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.